admin
June 27, 2023
Europol on Tuesday announced that the takedown of EncroChat in July 2020 led to 6,558 arrests worldwide and the...
admin
June 27, 2023
A new Android malware campaign has been observed pushing the Anatsa banking trojan to target banking customers...
admin
June 27, 2023
Fortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC network access control...
admin
June 26, 2023
Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And...
admin
June 26, 2023
In what's an ingenious side-channel attack, a group of academics has found that it's possible to recover secret...
admin
June 26, 2023
An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month...
admin
June 26, 2023
The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in...
admin
June 26, 2023
Microsoft has disclosed that it's detected a spike in credential-stealing attacks conducted by the Russian state-affiliated hacker...
admin
June 24, 2023
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities...
admin
June 24, 2023
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced...
admin
June 24, 2023
A threat actor known as Muddled Libra is targeting the business process outsourcing (BPO) industry with persistent attacks that...
admin
June 24, 2023
The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security
Have you ever...
admin
June 24, 2023
A new strain of JavaScript dropper has been observed delivering next-stage payloads like Bumblebee and IcedID.
Cybersecurity firm...
admin
June 24, 2023
The U.S. National Security Agency (NSA) on Thursday released guidance to help organizations detect and prevent infections...
admin
June 24, 2023
Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part of a new...
admin
June 22, 2023
A new phishing campaign codenamed MULTI#STORM has set its sights on India and the U.S. by leveraging JavaScript files...
admin
June 22, 2023
Losing sleep over Generative-AI apps? You're not alone or wrong. According to the Astrix Security Research Group,...
admin
June 22, 2023
Millions of software repositories on GitHub are likely vulnerable to an attack called RepoJacking, a new study...
admin
June 22, 2023
The Chinese cyber espionage actor known as Camaro Dragon has been observed leveraging a new strain of self-propagating malware...
admin
June 22, 2023
Why Data Exfiltration Detection is Paramount?
The world is witnessing an exponential rise in ransomware and data theft...